Synopsys Releases Seeker 2018.07
August 01, 2018

Synopsys announced the availability of the latest major Seeker release, an interactive application security testing (IAST) solution redesigned to enable DevSecOps and continuous delivery of secure web applications.

Seeker integrates seamlessly into CI/CD pipelines and monitors web applications during preproduction testing cycles. Using patented technology, Seeker is the only application security solution that detects and automatically verifies whether vulnerabilities are exploitable, providing developers with accurate, actionable information in real time.

Seeker continuously mitigates application security risk in a tight feedback loop, complementing DAST scans and penetration tests that occur later in the development cycle and often require dedicated, out-of-band testing cycles and manual results verification and triage.

To address software dependency risk, Seeker integrates Black Duck Binary Analysis (formerly Protecode SC) to automatically detect known vulnerabilities and license conflicts in open source components. Seeker also provides sensitive-data tracking to help achieve compliance with standards and regulations like PCI DSS and GDPR. Seeker is easy to deploy out of the box and supports large-scale, cloud-based, and microservices-based application architectures.

"Seeker is designed specifically for organizations embracing DevOps and leveraging automation to deliver continuous software improvements to their customers," said Andreas Kuehlmann, GM of the Synopsys Software Integrity Group. "Due to its continuous monitoring, unrivaled accuracy, and contextualized remediation guidance, Seeker removes the manual elements of security testing and enables developers to take ownership of application risk."

Key features of Seeker 2018.07 include:

- Active vulnerability verification for unrivaled accuracy: Seeker provides automated active verification to confirm that detected vulnerabilities are exploitable. This verification is achieved through patented technology that replays original HTTP(S) requests with tainted parameters and monitors the resulting application dataflow. The result is a near-zero false positive rate, which is significantly lower than that of other IAST and DAST solutions and reduces the cost of manual verification.

- Sensitive-data tracking: Seeker enables security teams to identify and track sensitive data, such as credit card numbers, usernames, and passwords, to ensure that it is handled securely and not stored in log files or databases with weak or no encryption. Sensitive-data tracking helps organizations comply with data security regulations including PCI DSS, HIPAA, and GDPR.

- CI/CD integration and flexible deployment: Seeker can be deployed in virtually any type of automated or manual testing environment with minimal configuration required. Seeker fits seamlessly into CI/CD pipelines with native plugins and easy-to-use web APIs for bug tracking, build, and test automation tools. Seeker supports standard, microservices-based, and cloud-based application architectures and is scalable for large enterprise requirements.

The Latest

October 18, 2018

Are applications teams prepared to manage the chaos arising from an ever-growing landscape of heterogeneous deployment types? A recent survey of application and operations professionals sought to better understand how the industry is shifting and what the future of DevOps might look like. Here is what the survey uncovered ...

October 16, 2018

More than half of organizations have a dedicated DevOps team to help them better implement agile strategies, accelerate release cycles and ensure continuous development. However, databases have a habit of holding DevOps back ...

October 15, 2018

Test Environment Management can save organizations close to $10,000 for each release, yet only four percent of large enterprises have fully integrated TEM processes into organizational DNA, according to the 2018 Test Environment Management Survey released by EMA and Plutora ...

October 11, 2018

Agile is indeed expanding across the enterprise and there was a significant jump from last year to this year in the percentage of respondents who indicated that all or almost all of their teams were agile, according to the State of Agile 2018 report from CollabNet ...

October 09, 2018

Adopting a modern application architecture is critical to business success and a significant driver of profit growth in today’s digital economy, according to the results of a global survey of IT and business executives released by CA Technologies and conducted by Frost & Sullivan ...

October 04, 2018

How do you integrate tools to enable shift-left performance? The following tools will simplify maintenance, can be managed in a centralized way, and provide an easy-to-use UI to comprehend results ...

October 03, 2018

Focusing at the API layer of an application can help enable a scalable testing practice that can be efficiently executed as part of an accelerated delivery process, and is a practice that can be adopted and enabled at the earliest possible stages of development — truly shifting left functional testing. But what about performance testing? How do we enable the shift left of nonfunctional testing? Here, we explore what this means and how to enable it in your organization ...

October 01, 2018

As businesses look to capitalize on the benefits offered by the cloud, we've seen the rise of the DevOps practice which, in common with the cloud, offers businesses the advantages of greater agility, speed, quality and efficiency. However, achieving this agility requires end-to-end visibility based on continuous monitoring of the developed applications as part of the software development life cycle ...

September 27, 2018

Imagine that you are tasked with architecting a mission-critical cloud application. Or migrating an on-premise app to the cloud. You may ask yourself, "how do the cloud savvy companies like Airbnb, Adobe, SalesForce, etc. build and manage their modern applications?" ...

September 26, 2018

In a DevOps evolution, there are many paths to success, but even more that lead to failure, according to the 2018 State of DevOps Report from Puppet ...

Share this